Transforming & Securing Employee and Caregiver Experience

Large healthcare organizations lose more than $750K annually due to decreased employee productivity. The healthcare industry suffers an estimated $6.2B, annually in security breaches. Cloud adoption in the Healthcare Industry is at a tipping point. The time is now to leverage Identity-as-a-Service (IDaaS) to centralize access management into cloud apps like Office 365 and on-prem apps like Epic.

According to a HIMSS report, of healthcare providers already using cloud services 73.4 percent report leveraging cloud to support financial, operational and HR applications. Watch this webinar to understand the increasing trends towards leveraging IDaaS to improve business operations and drive cost efficiencies while ensuring a secure environment for cloud and on-prem apps.

You’ll learn:
• How to roll out a new digital experience for employees within weeks instead of months or even longer
• How other healthcare organizations have leveraged IDaaS: an Office 365 integration demo
• How to get started quickly and meet deadlines for new cloud app deployments

It’s no secret that today’s employees are more mobile than ever, accessing your corporate resources from a myriad of devices, locations and networks. This has brought on a new shift in the IT paradigm which requires identity to act as the central control point in defining an enterprise security strategy.

A dynamic identity and access management platform should be extensible and integrate with your existing detection and response tools, as well as give you flexible automation and orchestration in managing an end user’s lifecycle journey.

Join us to learn how to:

- Enhance your existing investments in security by providing a centralized identity and access management tool
- How enterprises can protect against data breaches and common identity attacks

It’s no secret that today’s hackers are smarter than ever before - a motivated hacker can use a variety of different methods to steal passwords from unsuspecting users.

While two-factor authentication solutions have been around for a while, they're no longer comprehensive enough to defend the new perimeter. Join us to learn the anatomy of common identity attacks, and how to keep hackers out of your organization.

We’ll discuss:

Identity attacks that exploit insecure methods of authentication
How to add a smart layer of security over your critical apps, services, and devices
What to look for in a multi-factor authentication solution

Speaker: Teju Shyamsundar, Okta, Sr. Product Marketing Manager

Bio: Teju is a Product Marketing Manager on Okta's product team, focusing on integrations across Okta's set of core products. She is responsible for driving the value of the integrations across not just Okta's products, but also integrations with the vendors that Okta partners with. Prior to Okta, Teju was a field engineer at Microsoft, focusing on getting customers setup with enterprise mobility deployments.

Data breaches can happen to any organization, so it's important to understand your organization's risk of a data breach. But where should you start your assessment? What practical and pragmatic steps can you take?

In this presentation, we'll discuss the myths vs. the realities on how:

- Breaches happen
- The rapidly growing cloud and SaaS adoption changes the game for defenders
- Identity-driven security can help reduce the probability of a breach happening to your organization

About the presenter:

Sami is a security professional with over 15 years of experience across the security spectrum helping large enterprises with card fraud, web-scale user authentication and risk management and cloud workload security. At Okta Sami is responsible for technical marketing of Okta security business. Previously Sami was Principal Technologist at CloudPassage and before that he ran RSA’s Americas Sales Engineering for their Fraud Prevention product lines.

With the demise of the traditional enterprise network security perimeter, enterprises are leveraging the power of identity to secure and control access to all applications, systems, and data. All this IT infrastructure is housed both on-premises and in the cloud, and must be accessed by authorized local and remote employees as well as a growing web of partners, contractors, and suppliers.

Join us to learn how the Okta Identity Cloud coupled with SailPoint Identity Governance can help you securely and effectively authenticate, provision, and govern access to all applications and data across the hybrid cloud and on-premises enterprise.

Join the two leaders in Identity for this informative webinar and learn how to:

Over their 100-year history, Nexteer Automotive welcomed technology advancements and innovations. They continue this journey in the era of digital transformation to fuel productivity, efficiency and innovation.

While modernizing IT led to automation and productivity gains it also significantly increased their attack surface in a time when cyber threats are all too common. The complexity of legacy infrastructure, on-prem apps, and adoption of cloud apps, produced a multitude of end-user entry points. This complicated both security and user lifecycle management.

Join CISO Arun Desouza from Nexteer to learn how they used identity as the lynchpin to connect disparate systems and applications. He will discuss how they used identity management to:

- Reduce reliance on servers and complex architecture requirements of AD FS and MIM while deploying O365 with Azure AD.
- Improve user lifecycle management by provisioning employees into all on-prem and cloud apps using HR-as-a-Master.
- Integrate identity with network security infrastructure to reduce breaches and gain immediate visibility to when and where threats take place.

Don’t want to miss this opportunity to hear how Nexteer used identity architecture to connect everything and improve ease of use, scalability, automation and productivity.

Sibrina Subedar is a Director of Product Marketing at Okta. She spent 12 years at Cisco in many roles including Customer Advocacy & Product Management and working across many technologies like routing, switching, security, VoIP. The following 3 years at NetApp she started with product management on security products.

As breaches fill the headlines, more organizations are adopting a Zero Trust security model and its key principle of "never trust, always verify." Modern implementations of this model are focusing on "Next Gen Access," where identity and authentication can greatly enhance your security posture with less complexity than network-based solutions.

Join Nick Fisher of Okta where we’ll discuss how companies today are having success taking a Zero Trust approach to security.

Cost savings, storage, ease of updates. The allure of the cloud is hard to ignore, with some reports citing over 90% of organizations using cloud services in some manner. But all the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and how identity can help overcome cloud frustrations.

The White House’s American Technology Council and Office of American Innovation on modernizing federal technology published specific recommendations to jumpstart a new wave of modernization efforts by accelerating cloud adoption, consolidating networks and prioritizing key applications for needed upgrades.

In this webinar, originally hosted by i360Gov, leaders from government and industry provide an overview of current initiatives and solutions to the many IT modernization challenges agencies face, such as:

- Maintenance that often requires immediate attention and runs the risk of breaking integrations and upgrades
- Legacy solutions that are unable to properly communicate between on-premises, mobile, and the cloud
- Citizen facing services not designed for today’s technology environment

You will also learn about Identity, the hidden accelerator to IT modernization, and how by creating a single solution for identity, agencies can speed up digital and cloud programs.

If you’re a government IT leader, you’re no doubt looking at how to help your agency transition from legacy systems, paper-based processes and inefficient use of employee time – all with an eye toward better serving citizens. An innovative cloud-based approach to identity management accelerates these digital transformation efforts, while saving money and strengthening security.

Watch this webinar for an engaging discussion on how a cloud-based identity management portal can:
- Speed up the deployment of new apps and services while simplifying integration
- Boost employee productivity by expediting user provisioning and deprovisioning
- Increase citizen satisfaction with your agency’s services by providing users with convenient and secure access to government services

While APIs created new ways to reach our customers, our development practices haven’t adapted accordingly. The principles which have served us well are insufficient when users can and will connect at any time from any location with any device while still demanding a smooth, consistent experience.

Instead of hoping for the best or blindly applying the old processes, let’s go back to basics and the well-supported standards to build an experience that keeps our customers happy and still lets our team sleep at night. In this session, we’ll cover the foundations of developing, securing, and managing access to the critical APIs that drive our business.

If your organization is in the middle of IT modernization, you know how frustrating it can be when legacy systems and modern cloud technologies and applications don’t get along. Choosing the right cloud Identity and access management architecture over a half baked “free” or “included” product can make a difference between a successful transition or another IT horror story.
Join this webinar to learn about:
- Architecting cloud identity solutions for the future: key decisions and common pitfalls
- Benefits of using a modern cloud-based identity and access management platform for Office 365, Windows 10, On-Premises SharePoint, Intune, -
- Dynamics, and more Microsoft applications
- Advanced lifecycle management for Office 365 - with demo

Join Pitney Bowes, Okta, and F5 as we discuss how Pitney Bowes implemented Identity Management and Access Controls to help deliver a secure digitally connected commerce platform for its customers and business partners. With Okta and F5, Pitney Bowes extended their IT infrastructure to securely manage customer access to applications both in the cloud and behind the firewall.

In this session you'll learn how to:
- Secure your Hybrid IT environment, while transitioning to the cloud
- Centralize end-users access to both cloud and on-prem apps
- Enable new customer portal projects and other digital initiatives

Consumers today are demanding rich experiences on their own terms, on their own schedules, just in time, and on mobile. Medical appointments can be scheduled with a few taps for later in the day, photos can be uploaded from your iPhone and printed at your local pharmacy, and last minute hotel rooms can be booked for a bargain with the swipe of a thumb.
As companies race to build these omnichannel experiences, identity management challenges such as fragmented user experiences, incomplete user profile and activity information, and security at risk can slow down development efforts.

Mobility management can be a complex undertaking. In this Q&A session, you’ll learn best practices from a panel of your peers including CJ Wiemer, Information Systems Security Engineer at kCura; Kelsey van Haaster, Product Owner, Identity at ThoughtWorks; and Owen Fuller, Systems Administrator at The Weitz Company on how to make mobile management stress-free for IT while getting end-users to even like it. Come prepared to participate in this interactive session.

In March, Okta acquired Stormpath to accelerate our Platform product. Come see how that injection of new DNA has already improved the product, and get a sneak peek at what's coming soon to help you build modern web, mobile, and API-driven applications.

In this session, you’ll learn some of our homegrown best practices on how to tackle the future of identities, resources, and access lifecycles. This will include enhancements to existing on-prem and cloud directory integrations, provisioning integrations to cloud apps, and governing access through reporting and policies. We’ll share information about in-flight projects, as well as our future vision and direction in the space.